C:\pacanajeyo.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-30_e968a6ee6ae3aadc676e3da246ad052b_black-basta_luca-stealer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-30_e968a6ee6ae3aadc676e3da246ad052b_black-basta_luca-stealer.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-03-30_e968a6ee6ae3aadc676e3da246ad052b_black-basta_luca-stealer
-
Size
10.9MB
-
MD5
e968a6ee6ae3aadc676e3da246ad052b
-
SHA1
d8f995b2ac476b8167a03cca9c741b9793edf5f9
-
SHA256
3cc1d69ebeed06739436067ba1457c15dfe54a5240a2a30fb774226197c5355f
-
SHA512
554cb5577e5af3208a812742091957a8f97dd435913832ec2412f0b9ca38f89a3c0c3c1bf8c332bcf3da44febea426c9158053baa2b41ad71f816f6cbe2ca1ee
-
SSDEEP
49152:NiSUBoooooooooooooooooooooooooooooooooooooooooooooooooooooooooou:NbUY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2025-03-30_e968a6ee6ae3aadc676e3da246ad052b_black-basta_luca-stealer
Files
-
2025-03-30_e968a6ee6ae3aadc676e3da246ad052b_black-basta_luca-stealer.exe windows:5 windows x86 arch:x86
9a6cbef1166aa060cd7bd0b109b04449
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_SYSTEM
PDB Paths
Imports
kernel32
GetPrivateProfileSectionNamesA
GetOEMCP
VirtualProtect
lstrlenW
GetStdHandle
lstrcmpA
FreeEnvironmentStringsW
OpenSemaphoreA
DefineDosDeviceA
LoadLibraryA
HeapReAlloc
GetCurrentDirectoryW
SetCalendarInfoA
GetProcAddress
OpenJobObjectA
CreateMailslotA
CreateDirectoryExW
GetExitCodeProcess
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetCurrentProcess
TerminateProcess
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
RtlUnwind
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
GetModuleFileNameW
MultiByteToWideChar
WideCharToMultiByte
WriteFile
GetACP
HeapAlloc
HeapValidate
GetSystemInfo
EncodePointer
DecodePointer
GetFileType
LCMapStringW
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
GetProcessHeap
OutputDebugStringA
OutputDebugStringW
CloseHandle
WaitForSingleObjectEx
CreateThread
SetStdHandle
GetStringTypeW
HeapFree
HeapSize
HeapQueryInformation
WriteConsoleW
RaiseException
GetConsoleCP
GetConsoleMode
SetFilePointerEx
FlushFileBuffers
CreateFileW
Sections
.text Size: 181KB - Virtual size: 180KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 47.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 220B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 51KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10.6MB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ